
{"id":207,"date":"2014-10-25T09:53:21","date_gmt":"2014-10-25T00:53:21","guid":{"rendered":"http:\/\/164.125.70.63\/itrc\/?p=207"},"modified":"2025-12-23T19:51:08","modified_gmt":"2025-12-23T10:51:08","slug":"10%ec%9b%9425%ec%9d%bc-bexco%ec%97%90%ec%84%9c-%ea%b0%9c%ec%b5%9c%eb%90%98%eb%8a%94%ea%b8%80%eb%a1%9c%eb%b2%8c-ict-%ed%94%84%eb%a6%ac%eb%af%b8%ec%96%b4-%ed%8f%ac%eb%9f%bc%ec%82%b0%ec%97%85%ec%a0%84","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/207\/","title":{"rendered":"10\uc6d425\uc77c BEXCO\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294\uae00\ub85c\ubc8c ICT \ud504\ub9ac\ubbf8\uc5b4 \ud3ec\ub7fc(\uc0b0\uc5c5\uc804\ub9dd\ucee8\ud37c\ub7f0\uc2a4)\uc5d0\uc11c &#8220;Security and Privacy Issues in IoT&#8221;\uc5d0 \ub300\ud55c \uac15\uc5f0\uc774 \uc608\uc815\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4"},"content":{"rendered":"<p>10\uc6d425\uc77c BEXCO\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294 \uae00\ub85c\ubc8c ICT \ud504\ub9ac\ubbf8\uc5b4 \ud3ec\ub7fc\uc5d0\uc11c\ub294 \ubd80\uc0b0\ub300\ud559\uad50 \uc0ac\ubb3c\uc778\ud130\ub137 ITRC \uc13c\ud130\uc7a5\uc778 \uae40\ud638\uc6d0 \uad50\uc218\uc758 &#8220;Security and Privacy Issues in IoT&#8221;\uc5d0 \ub300\ud55c \uac15\uc5f0\uc774 \uc608\uc815\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4<\/p>\n<p>24\uc77c\uc5d0\uc11c 25\uc77c\uae4c\uc9c0 BEXCO\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294 \uae00\ub85c\ubc8c \ud504\ub9ac\ubbf8\uc5b4 \ud3ec\ub7fc\uc5d0\uc11c\ub294 \ud3ec\ub7fc\uacfc \/\uc0b0\uc5c5\uc804\ub9dd \ucee8\ud37c\ub7f0\uc2a4\ub97c \uac1c\ucd5c\ud558\ub294\ub370, \ud2b9\ud788 \ud3ec\ub7fc\uc5d0\uc11c\ub294 \ub370\ub2c8\uc2a4 \ud64d \ub4f1 \uad6d\ub0b4\uc678 ICT \uc804\ubb38\uac00\ub4e4\uc758 \uac15\uc5f0\uc774 \uc788\uc73c\ubbc0\ub85c \ub9ce\uc740 \ucc38\uad00 \ubc14\ub78d\ub2c8\ub2e4.<\/p>\n<p><a href=\"http:\/\/www.premierforum.kr\/main\/index_kor.asp\">http:\/\/www.premierforum.kr\/main\/index_kor.asp<\/a><\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>10\uc6d425\uc77c BEXCO\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294 \uae00\ub85c\ubc8c ICT \ud504\ub9ac\ubbf8\uc5b4 \ud3ec\ub7fc\uc5d0\uc11c\ub294 \ubd80\uc0b0\ub300\ud559\uad50 \uc0ac\ubb3c\uc778\ud130\ub137 ITRC \uc13c\ud130\uc7a5\uc778 \uae40\ud638\uc6d0 \uad50\uc218\uc758 &#8220;Security and Privacy Issues in IoT&#8221;\uc5d0 \ub300\ud55c \uac15\uc5f0\uc774 \uc608\uc815\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4 24\uc77c\uc5d0\uc11c 25\uc77c\uae4c\uc9c0 BEXCO\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294 \uae00\ub85c\ubc8c \ud504\ub9ac\ubbf8\uc5b4 \ud3ec\ub7fc\uc5d0\uc11c\ub294 \ud3ec\ub7fc\uacfc \/\uc0b0\uc5c5\uc804\ub9dd \ucee8\ud37c\ub7f0\uc2a4\ub97c \uac1c\ucd5c\ud558\ub294\ub370, \ud2b9\ud788 \ud3ec\ub7fc\uc5d0\uc11c\ub294 \ub370\ub2c8\uc2a4 \ud64d \ub4f1 \uad6d\ub0b4\uc678 ICT \uc804\ubb38\uac00\ub4e4\uc758 \uac15\uc5f0\uc774 \uc788\uc73c\ubbc0\ub85c \ub9ce\uc740 \ucc38\uad00 \ubc14\ub78d\ub2c8\ub2e4. http:\/\/www.premierforum.kr\/main\/index_kor.asp<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-207","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":3,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/207\/revisions"}],"predecessor-version":[{"id":9608,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/207\/revisions\/9608"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}